General

  • Target

    afarr.rar

  • Size

    608KB

  • MD5

    acfc2b60a2d79e62aa64082f7369b61a

  • SHA1

    e4a3da22aa758dfd724bad24dcf19c1a78352945

  • SHA256

    e5ef37052eccb6515f29e5cbb7ec7178948431f40be02180d1a996e4c25cfebf

  • SHA512

    0f53eec63078d312897bc332d7e0d183ea9ec4821bd1ed3b69a6a64672b8b4b2f22e2a2f63565939e16026e523b46a6f408b3b47884131b64b447a10c9437a69

  • SSDEEP

    12288:8AOg8h2fDi0s9Wr4SclY22ujbA46ttL+lvLiEHBIqNiA8hJNdlXFn30DxNbT:8ffkTjkSJZEbA1AOEhE1X1M

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Zgrat family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • afarr.rar
    .rar
  • exploit/Electron.exe
    .exe windows:5 windows x86 arch:x86

    b757da5e2efe61bb640cadcd6679738f


    Headers

    Imports

    Sections

  • exploit/Read before installing.txt
  • exploit/V2/Electron.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • exploit/autoexec/config.json
  • exploit/autoexec/vehicle.lua
  • exploit/autoexec/weapon.lua
  • exploit/bin/Aimbot 3.0.txt
  • exploit/bin/themes.json
  • exploit/scripts/Adopt.txt
  • exploit/scripts/Arsenal.txt
  • exploit/scripts/Blox Fruits.txt
  • exploit/scripts/MM2.txt
  • exploit/workspace/Speech/1.15.0.1/space.txt